There have been recent reports that have indicated that there are a few countries around the world that will be banning the use of Huawei and ZTE’s communications equipment in their infrastructure. It was also recently speculated that Canada could be considering a similar move, where such a move could end up costing carriers at least $1 billion.
For the past few years, SplashData has shared what the worst passwords of the year have been. You would think that with such information being made available, and all the security breaches we’ve seen, that users would be more diligent about selecting stronger passwords to protect their accounts.
A couple of months ago, a report from Bloomberg suggested that Apple’s servers and other companies that used Super Micro’s tech were compromised. This was said to have been due to Chinese spies planting a tiny chip in the motherboards of the servers that could relay information back to China.
Encryption just like many tools in life, can be used for good and bad things. For example it is used to help protect hackers from intercepting your messages, credit card numbers, emails, and more. However encryption can also be viewed negatively as it can be used by the bad guys to send messages and information that law enforcement cannot access.
Considering that a lot of websites these days require us to submit personal information when signing up for a service, like our names, email address, date of birth, and sometimes more, this is a treasure trove for hackers who will then be able to resell that information on the dark web, or use it for other nefarious purposes.
These days it seems that there is a disturbing trend in which we are hearing more and more big companies getting hacked and having their customer databases stolen. We’ve seen this happen with Target, Cathay Pacific, and how can we forget Yahoo who suffered the biggest breach in the history of the internet.
One of the joys of modern day printers is that they can print wirelessly. This means that regardless of what device you’re using, you will be able to send documents and images to the printer without having to deal with cables and all that jazz. Unfortunately hooking a printer up to the network also means that opening ourselves up to potential hacks.
The conveniences offered up by smart home devices like smart bulbs, thermostats, locks, and more are too good to pass up. After all who wouldn’t relish the idea of a home adapting to our needs, our lights turning on automatically when needed, temperatures adjusted dynamically to offer the most comfort, and fridges that reminds us and even help us order food when we’re out.
Headphones back in the day were largely a plug and play affair, where you’d plugged in your headphones to the device and you’d be good to go. For the most part that is still very true, but companies these days are trying to expand on their offerings by making them more feature-rich by allowing for customization of the sound and other features through software configurations.
These days it’s starting to feel like big companies with a lot of resources that could be spent on protecting their data are experiencing data breaches. Either this is a lax in security or hackers and hacking tools have gotten considerably more sophisticated. In fact Dell themselves have recently experienced a hacking attempt on its network.
We all know that sinking feeling of accidentally deleting a file or photo and not having any way of recovering it. This is why iOS devices, when a photo is deleted, it gets sent to a “Recently deleted” folder which basically gives users about a month or so to recover it, after which it will be deleted permanently.
Over the years Netflix has encourage their developers to experiment with different ways to interact with the platform. For example several years ago the company created its own “Netflix and chill” button, and a couple of years ago they explored the idea of a virtual reality video store where you could “walk around” and browse videos like the good old days.
Apple had recently announced its new MacBook Air which represents a pretty huge update that we’ve seen to the lineup in a while. One of those major changes they made was introducing Touch ID to the laptop, as well as the T2 secure enclave that stores fingerprint data, encryption keys, and more.
Due to Apple refusing to build a backdoor into iOS to allow law enforcement access to its platform, law enforcement officials have had no choice but to seek outside help. This has resulted in tools such as GrayKey which in the past is said to have successfully unlocked iPhones belonging to suspects.